Analysis
-
max time kernel
129s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 16:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://104.192.83.23/.update.sh
Resource
win10v2004-20231023-en
General
-
Target
http://104.192.83.23/.update.sh
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133434176807700487" chrome.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4036 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2136 chrome.exe 2136 chrome.exe 5004 chrome.exe 5004 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2136 chrome.exe 2136 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe Token: SeShutdownPrivilege 2136 chrome.exe Token: SeCreatePagefilePrivilege 2136 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe 2136 chrome.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 2984 OpenWith.exe 4348 OpenWith.exe 4348 OpenWith.exe 4348 OpenWith.exe 4348 OpenWith.exe 4348 OpenWith.exe 4348 OpenWith.exe 4348 OpenWith.exe 4348 OpenWith.exe 4348 OpenWith.exe 4348 OpenWith.exe 4348 OpenWith.exe 4348 OpenWith.exe 4348 OpenWith.exe 4348 OpenWith.exe 4348 OpenWith.exe 4348 OpenWith.exe 4348 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2136 wrote to memory of 1108 2136 chrome.exe 84 PID 2136 wrote to memory of 1108 2136 chrome.exe 84 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 1760 2136 chrome.exe 87 PID 2136 wrote to memory of 2832 2136 chrome.exe 86 PID 2136 wrote to memory of 2832 2136 chrome.exe 86 PID 2136 wrote to memory of 1228 2136 chrome.exe 88 PID 2136 wrote to memory of 1228 2136 chrome.exe 88 PID 2136 wrote to memory of 1228 2136 chrome.exe 88 PID 2136 wrote to memory of 1228 2136 chrome.exe 88 PID 2136 wrote to memory of 1228 2136 chrome.exe 88 PID 2136 wrote to memory of 1228 2136 chrome.exe 88 PID 2136 wrote to memory of 1228 2136 chrome.exe 88 PID 2136 wrote to memory of 1228 2136 chrome.exe 88 PID 2136 wrote to memory of 1228 2136 chrome.exe 88 PID 2136 wrote to memory of 1228 2136 chrome.exe 88 PID 2136 wrote to memory of 1228 2136 chrome.exe 88 PID 2136 wrote to memory of 1228 2136 chrome.exe 88 PID 2136 wrote to memory of 1228 2136 chrome.exe 88 PID 2136 wrote to memory of 1228 2136 chrome.exe 88 PID 2136 wrote to memory of 1228 2136 chrome.exe 88 PID 2136 wrote to memory of 1228 2136 chrome.exe 88 PID 2136 wrote to memory of 1228 2136 chrome.exe 88 PID 2136 wrote to memory of 1228 2136 chrome.exe 88 PID 2136 wrote to memory of 1228 2136 chrome.exe 88 PID 2136 wrote to memory of 1228 2136 chrome.exe 88 PID 2136 wrote to memory of 1228 2136 chrome.exe 88 PID 2136 wrote to memory of 1228 2136 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://104.192.83.23/.update.sh1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc15fa9758,0x7ffc15fa9768,0x7ffc15fa97782⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1904,i,13627939259276404102,7191481634209168053,131072 /prefetch:82⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1904,i,13627939259276404102,7191481634209168053,131072 /prefetch:22⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1904,i,13627939259276404102,7191481634209168053,131072 /prefetch:82⤵PID:1228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2872 --field-trial-handle=1904,i,13627939259276404102,7191481634209168053,131072 /prefetch:12⤵PID:4904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3076 --field-trial-handle=1904,i,13627939259276404102,7191481634209168053,131072 /prefetch:12⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4584 --field-trial-handle=1904,i,13627939259276404102,7191481634209168053,131072 /prefetch:82⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4716 --field-trial-handle=1904,i,13627939259276404102,7191481634209168053,131072 /prefetch:82⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 --field-trial-handle=1904,i,13627939259276404102,7191481634209168053,131072 /prefetch:82⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2520 --field-trial-handle=1904,i,13627939259276404102,7191481634209168053,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3184
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2984
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:492
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4348 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\update.sh2⤵
- Opens file in notepad (likely ransom note)
PID:4036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD56becd7d17512c805c2f6e17ca9127ae9
SHA1ae4c1318d8d3b0965784c2f2bf8e42f0a6c0171b
SHA256a9ee7e71aaea52a9526471b1963b2f70518097aa0bbcb72954a67cd647aecad0
SHA51219e2d1cef50b25ee4873937d8a08e2d9a0a6e67dc5806bb6661950189727429eafa13765895c4c949e5c293b30277acc9df32232a41d24f72b6196fbac27f0e6
-
Filesize
5KB
MD5be90508cec778efeb2663cc30e45a0d9
SHA1b2bd2a40e7e1d863715f4b841baf124f00c749f8
SHA256a1b108e932c3352a8afc1f8245057bf0e8b11be9b4cf254b8c51fb99689766d0
SHA512cc8eea4a632a4d8954a8d4b20ab7523619ba115676c2fe113419a94b995b82c54f787ff33776840555c4dfd219b593ce9eed5bea3fe94ce7b418980160e80f0c
-
Filesize
5KB
MD52735ab73622fb39aac9c23421aeeae27
SHA1ebdd7539958c7d48033266e490784ad0aae3de50
SHA256ce7fc041ad4c5c04f0003a6b0e44008733aa28f19f633cab6cfc8e78e708cbd7
SHA512d4698ae6a8e694ff73442060cd82ca9ce3087bb7212bf0f792c9aed0c67f3d40400c0c95e6e36dadbd7d6fb19995e7b9db0ab767b24d5a13805fe51a898daeb0
-
Filesize
109KB
MD507b15fb798bed5d444102fcd1612ffbe
SHA1fca874027712275b5c2548000aefcd0bfd0d68e9
SHA2567bd8540a1c8ad26c4db19ce1e41b63d10c8e183a46ffc17265a79461f7c7e03a
SHA512d9fdc3d0810aed7564b2a210c4804897291064757799cff57fde8667da853680b847cbaaa5e200620437940fe3d531c78cc38add107a976660b5f4aceb255d2f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
105B
MD59c634e82e40502a2c71e3a92f867f6db
SHA1d2c1460efb79c3793e89d6c222a3b2f680e4e68f
SHA2567038adf2087759037eab52177ad2cd4be682c1769d3a23b160cea778566b2f18
SHA512fe5534d4a66aba2ef19bab7b807728cd08434b53798f87fa67177c7f3c2393bf7ca2ebb56ccfeea4e35ac2b4b5bc61fba74f6f7b29574d93779a619dd465038e
-
Filesize
105B
MD59c634e82e40502a2c71e3a92f867f6db
SHA1d2c1460efb79c3793e89d6c222a3b2f680e4e68f
SHA2567038adf2087759037eab52177ad2cd4be682c1769d3a23b160cea778566b2f18
SHA512fe5534d4a66aba2ef19bab7b807728cd08434b53798f87fa67177c7f3c2393bf7ca2ebb56ccfeea4e35ac2b4b5bc61fba74f6f7b29574d93779a619dd465038e